Topic Last Modified: 2005-11-18

The Microsoft® Exchange Server Analyzer Tool reads the following registry entry to determine the value for the Rich Text Format (RTF) message antivirus scanning:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\MSExchangeIS\VirusScan

If the Exchange Server Analyzer finds the value for ScanPlainText is set to 0, a warning is displayed.

The ScanPlainText registry key is set by third-party antivirus vendors that use the Exchange Virus Scanning API (VSAPI). It is recommended that you scan all message types for viruses, including plain text messages. You should enable virus scanning of all messages flowing through an Exchange Server computer.

Important:
This article contains information about editing the registry. Before you edit the registry, make sure you understand how to restore the registry if a problem occurs. For information about how to restore the registry, view the "Restore the Registry" Help topic in Regedit.exe or Regedt32.exe.

To correct this error

  • In your Exchange-aware antivirus application, enable scanning of all messages.

    -or-

  • Manually modify the entry in the registry by performing the following procedure:

    1. Open a registry editor, such as Regedit.exe or Regedt32.exe.

    2. Navigate to:

      HKLM\System\CurrentControlSet\Services\MSExchangeIS\VirusScan

    3. Double-click the ScanPlainText registry entry and set its Value Data to 1.

    4. Exit the registry editor and restart the Microsoft Exchange Information Store service and the services representing your Exchange-aware antivirus software for the change to take effect.

Before you edit the registry, and for information about how to edit the registry, see the Microsoft Knowledge Base article 256986, "Description of the Microsoft Windows Registry" (http://go.microsoft.com/fwlink/?linkid=3052&kbid=256986).

For more information about fighting viruses, see the Web site "Slowing and Stopping E-mail Transmitted Viruses in an Exchange 2003 Environment" (http://go.microsoft.com/fwlink/?LinkId=47587).